kxxt / aspeak

A simple text-to-speech client for Azure TTS API.
MIT License
494 stars 57 forks source link

reqwest-0.11.14.crate: 4 vulnerabilities (highest severity is: 9.1) - autoclosed #51

Closed mend-bolt-for-github[bot] closed 1 year ago

mend-bolt-for-github[bot] commented 1 year ago
Vulnerable Library - reqwest-0.11.14.crate

Found in HEAD commit: e6fca34b37d722f0a140069426f1e09e8054a0c0

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (reqwest version) Remediation Available
WS-2023-0045 High 9.1 remove_dir_all-0.5.3.crate Transitive N/A*
WS-2023-0082 High 7.5 detected in multiple dependencies Transitive N/A*
WS-2023-0081 High 7.5 detected in multiple dependencies Transitive N/A*
WS-2023-0083 High 7.5 detected in multiple dependencies Transitive N/A*

*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.

Details

WS-2023-0045 ### Vulnerable Library - remove_dir_all-0.5.3.crate

A safe, reliable implementation of remove_dir_all for Windows

Library home page: https://crates.io/api/v1/crates/remove_dir_all/0.5.3/download

Dependency Hierarchy: - reqwest-0.11.14.crate (Root Library) - tokio-native-tls-0.3.1.crate - native-tls-0.2.11.crate - tempfile-3.3.0.crate - :x: **remove_dir_all-0.5.3.crate** (Vulnerable Library)

Found in HEAD commit: e6fca34b37d722f0a140069426f1e09e8054a0c0

Found in base branch: main

### Vulnerability Details

The remove_dir_all crate is a Rust library that offers additional features over the Rust standard library fs::remove_dir_all function. It suffers the same class of failure as the code it was layering over: TOCTOU race conditions, with the ability to cause arbitrary paths to be deleted by substituting a symlink for a path after the type of the path was checked.

Publish Date: 2023-02-24

URL: WS-2023-0045

### CVSS 3 Score Details (9.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-mc8h-8q98-g5hr

Release Date: 2023-02-24

Fix Resolution: remove_dir_all - 0.8.0

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
WS-2023-0082 ### Vulnerable Libraries - openssl-sys-0.9.80.crate, openssl-0.10.45.crate

### openssl-sys-0.9.80.crate

FFI bindings to OpenSSL

Library home page: https://crates.io/api/v1/crates/openssl-sys/0.9.80/download

Dependency Hierarchy: - reqwest-0.11.14.crate (Root Library) - tokio-native-tls-0.3.1.crate - native-tls-0.2.11.crate - openssl-0.10.45.crate - :x: **openssl-sys-0.9.80.crate** (Vulnerable Library) ### openssl-0.10.45.crate

OpenSSL bindings

Library home page: https://crates.io/api/v1/crates/openssl/0.10.45/download

Dependency Hierarchy: - reqwest-0.11.14.crate (Root Library) - tokio-native-tls-0.3.1.crate - native-tls-0.2.11.crate - :x: **openssl-0.10.45.crate** (Vulnerable Library)

Found in HEAD commit: e6fca34b37d722f0a140069426f1e09e8054a0c0

Found in base branch: main

### Vulnerability Details

`openssl` `X509NameBuilder::build` returned object is not thread safe

Publish Date: 2023-03-25

URL: WS-2023-0082

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-3gxf-9r58-2ghg

Release Date: 2023-03-25

Fix Resolution: openssl - 0.10.48

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
WS-2023-0081 ### Vulnerable Libraries - openssl-sys-0.9.80.crate, openssl-0.10.45.crate

### openssl-sys-0.9.80.crate

FFI bindings to OpenSSL

Library home page: https://crates.io/api/v1/crates/openssl-sys/0.9.80/download

Dependency Hierarchy: - reqwest-0.11.14.crate (Root Library) - tokio-native-tls-0.3.1.crate - native-tls-0.2.11.crate - openssl-0.10.45.crate - :x: **openssl-sys-0.9.80.crate** (Vulnerable Library) ### openssl-0.10.45.crate

OpenSSL bindings

Library home page: https://crates.io/api/v1/crates/openssl/0.10.45/download

Dependency Hierarchy: - reqwest-0.11.14.crate (Root Library) - tokio-native-tls-0.3.1.crate - native-tls-0.2.11.crate - :x: **openssl-0.10.45.crate** (Vulnerable Library)

Found in HEAD commit: e6fca34b37d722f0a140069426f1e09e8054a0c0

Found in base branch: main

### Vulnerability Details

`openssl` `X509Extension::new` and `X509Extension::new_nid` null pointer dereference

Publish Date: 2023-03-25

URL: WS-2023-0081

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-6hcf-g6gr-hhcr

Release Date: 2023-03-25

Fix Resolution: openssl - 0.10.48

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
WS-2023-0083 ### Vulnerable Libraries - openssl-sys-0.9.80.crate, openssl-0.10.45.crate

### openssl-sys-0.9.80.crate

FFI bindings to OpenSSL

Library home page: https://crates.io/api/v1/crates/openssl-sys/0.9.80/download

Dependency Hierarchy: - reqwest-0.11.14.crate (Root Library) - tokio-native-tls-0.3.1.crate - native-tls-0.2.11.crate - openssl-0.10.45.crate - :x: **openssl-sys-0.9.80.crate** (Vulnerable Library) ### openssl-0.10.45.crate

OpenSSL bindings

Library home page: https://crates.io/api/v1/crates/openssl/0.10.45/download

Dependency Hierarchy: - reqwest-0.11.14.crate (Root Library) - tokio-native-tls-0.3.1.crate - native-tls-0.2.11.crate - :x: **openssl-0.10.45.crate** (Vulnerable Library)

Found in HEAD commit: e6fca34b37d722f0a140069426f1e09e8054a0c0

Found in base branch: main

### Vulnerability Details

`openssl` `SubjectAlternativeName` and `ExtendedKeyUsage::other` allow arbitrary file read

Publish Date: 2023-03-25

URL: WS-2023-0083

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-9qwg-crg9-m2vc

Release Date: 2023-03-25

Fix Resolution: openssl - 0.10.48

Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
mend-bolt-for-github[bot] commented 1 year ago

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.